Movatterモバイル変換


[0]ホーム

URL:


US20150261969A1 - Image Analysis and Management - Google Patents

Image Analysis and Management
Download PDF

Info

Publication number
US20150261969A1
US20150261969A1US14/726,854US201514726854AUS2015261969A1US 20150261969 A1US20150261969 A1US 20150261969A1US 201514726854 AUS201514726854 AUS 201514726854AUS 2015261969 A1US2015261969 A1US 2015261969A1
Authority
US
United States
Prior art keywords
image
work product
enterprise
user
elements
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US14/726,854
Other versions
US9760724B2 (en
Inventor
Simon Frost
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Citrix Systems Inc
Original Assignee
Citrix Systems Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Citrix Systems IncfiledCriticalCitrix Systems Inc
Priority to US14/726,854priorityCriticalpatent/US9760724B2/en
Publication of US20150261969A1publicationCriticalpatent/US20150261969A1/en
Assigned to CITRIX SYSTEMS, INC.reassignmentCITRIX SYSTEMS, INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: FROST, SIMON
Application grantedgrantedCritical
Publication of US9760724B2publicationCriticalpatent/US9760724B2/en
Assigned to WILMINGTON TRUST, NATIONAL ASSOCIATIONreassignmentWILMINGTON TRUST, NATIONAL ASSOCIATIONSECURITY INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: CITRIX SYSTEMS, INC.
Assigned to GOLDMAN SACHS BANK USA, AS COLLATERAL AGENTreassignmentGOLDMAN SACHS BANK USA, AS COLLATERAL AGENTSECOND LIEN PATENT SECURITY AGREEMENTAssignors: CITRIX SYSTEMS, INC., TIBCO SOFTWARE INC.
Assigned to WILMINGTON TRUST, NATIONAL ASSOCIATION, AS NOTES COLLATERAL AGENTreassignmentWILMINGTON TRUST, NATIONAL ASSOCIATION, AS NOTES COLLATERAL AGENTPATENT SECURITY AGREEMENTAssignors: CITRIX SYSTEMS, INC., TIBCO SOFTWARE INC.
Assigned to BANK OF AMERICA, N.A., AS COLLATERAL AGENTreassignmentBANK OF AMERICA, N.A., AS COLLATERAL AGENTPATENT SECURITY AGREEMENTAssignors: CITRIX SYSTEMS, INC., TIBCO SOFTWARE INC.
Assigned to CLOUD SOFTWARE GROUP, INC. (F/K/A TIBCO SOFTWARE INC.), CITRIX SYSTEMS, INC.reassignmentCLOUD SOFTWARE GROUP, INC. (F/K/A TIBCO SOFTWARE INC.)RELEASE AND REASSIGNMENT OF SECURITY INTEREST IN PATENT (REEL/FRAME 062113/0001)Assignors: GOLDMAN SACHS BANK USA, AS COLLATERAL AGENT
Assigned to WILMINGTON TRUST, NATIONAL ASSOCIATION, AS NOTES COLLATERAL AGENTreassignmentWILMINGTON TRUST, NATIONAL ASSOCIATION, AS NOTES COLLATERAL AGENTPATENT SECURITY AGREEMENTAssignors: CITRIX SYSTEMS, INC., CLOUD SOFTWARE GROUP, INC. (F/K/A TIBCO SOFTWARE INC.)
Assigned to WILMINGTON TRUST, NATIONAL ASSOCIATION, AS NOTES COLLATERAL AGENTreassignmentWILMINGTON TRUST, NATIONAL ASSOCIATION, AS NOTES COLLATERAL AGENTSECURITY INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: CITRIX SYSTEMS, INC., CLOUD SOFTWARE GROUP, INC. (F/K/A TIBCO SOFTWARE INC.)
Activelegal-statusCriticalCurrent
Adjusted expirationlegal-statusCritical

Links

Images

Classifications

Definitions

Landscapes

Abstract

Systems, methods and apparatuses are described herein that allow an enterprise to analyze and manage work product images that are stored on a mobile device. Employees of an enterprise may use a mobile device to store both work product images (e.g., images of sensitive or proprietary information) and non-work product images (e.g., personal images). An enterprise may desire to enforce security protocols on the work product images, but the employee may not want the security protocols applied to the non-work product images. In some embodiments, by installing and executing an image manager that is able to analyze and manage images, the enterprise can enforce security protocols on only the work product images. Such security protocols may include the prevention of unauthorized viewing of the work product image (e.g., by encrypting the work product image) or deleting any work product image from the mobile device when the employee's employment has ended.

Description

Claims (20)

What is claimed is:
1. A method, comprising:
performing, by a computing device, image analysis on an image stored by the computing device to identify one or more text elements present in the image and one or more graphical elements present in the image;
analyzing the one or more text elements and the one or more graphical elements to determine that the image is a work product image; and
responsive to determining that the image is a work product image, restricting image security to prevent unauthorized viewing of the image.
2. The method ofclaim 1, wherein restricting image security to prevent unauthorized viewing of the image comprises editing original image data of the image to prevent unauthorized viewing of the original image data.
3. The method ofclaim 2, further comprising:
determining that a user has requested to view the image;
responsive to determining that the user has requested to view the image, restoring the original image data; and
causing display of the image subsequent to restoring the original image data.
4. The method ofclaim 3, further comprising:
determining that the user has requested to close the image; and
responsive to determining that the user has requested to close the image, reapplying restricted image security to prevent unauthorized viewing of the image.
5. The method ofclaim 1, further comprising:
determining that an enterprise event has occurred; and
responsive to determining that the enterprise event has occurred, delete only work product images stored at the computing device and ignoring non-work product images.
6. The method ofclaim 1, wherein performing image analysis on the image to identify the one or more text elements present in the image and the one or more graphical elements present in the image includes performing image analysis on the image to identify one or more whitespace elements.
7. The method ofclaim 1, wherein analyzing the one or more text elements and the one or more graphical elements to determine that the image is a work product image comprises analyzing the one or more text elements and the one or more graphical elements to determine that the at least one of the one or more text elements or the one or more graphical elements includes a chart.
8. The method ofclaim 1, wherein analyzing the one or more text elements and the one or more graphical elements to determine that the image is a work product image comprises analyzing the one or more text elements and the one or more graphical elements to determine that the at least one of the one or more text elements or the one or more graphical elements includes handwriting.
9. The method ofclaim 1, wherein the computing device is a mobile device used by an employee of an enterprise, and all steps are performed by an image manager installed on the mobile device that enforces a work product image security protocol provided by the enterprise.
10. A method, comprising:
performing, by a computing device, image analysis on an image stored by the computing device to identify one or more text elements present in the image and one or more graphical elements present in the image;
analyzing the one or more text elements and the one or more graphical elements to determine that the image includes sensitive or proprietary information; and
responsive to determining that the image includes sensitive or proprietary information image, restricting image security to prevent unauthorized viewing of the image.
11. The method ofclaim 10, wherein restricting image security to prevent unauthorized viewing of the image comprises editing original image data of the image to prevent unauthorized viewing of the original image data.
12. The method ofclaim 11, further comprising:
determining that a user has requested to view the image;
responsive to determining that the user has requested to view the image, restoring the original image data; and
causing display of the image subsequent to restoring the original image data.
13. The method ofclaim 12, further comprising:
determining that the user has requested to close the image; and
responsive to determining that the user has requested to close the image, reapplying restricted image security to prevent unauthorized viewing of the image.
14. The method ofclaim 10, further comprising:
determining that an enterprise event has occurred; and
responsive to determining that the enterprise event has occurred, delete only work product images stored at the computing device and ignoring non-work product images.
15. The method ofclaim 10, wherein performing image analysis on the image to identify the one or more text elements present in the image and the one or more graphical elements present in the image includes performing image analysis on the image to identify one or more whitespace elements.
16. The method ofclaim 10, wherein analyzing the one or more text elements and the one or more graphical elements to determine that the image includes sensitive or proprietary information comprises analyzing the one or more text elements and the one or more graphical elements to determine that the at least one of the one or more text elements or the one or more graphical elements includes a chart.
17. The method ofclaim 10, wherein analyzing the one or more text elements and the one or more graphical elements to determine that the image includes sensitive or proprietary information comprises analyzing the one or more text elements and the one or more graphical elements to determine that the at least one of the one or more text elements or the one or more graphical elements includes handwriting.
18. The method ofclaim 10, wherein the computing device is a mobile device used by an employee of an enterprise, and all steps are performed by an image manager installed on the mobile device that enforces a work product image security protocol provided by the enterprise.
19. An apparatus, comprising:
one or more processors; and
memory storing executable instructions configured to, when executed by the one or more processors, cause the apparatus to:
perform image analysis on an image stored by the computing device to identify one or more text elements present in the image and one or more graphical elements present in the image;
analyze the one or more text elements and the one or more graphical elements to determine that the image is a work product image; and
responsive to determining that the image is a work product image, restrict image security to prevent unauthorized viewing of the image.
20. The apparatus ofclaim 19, wherein causing the apparatus to restrict image security to prevent unauthorized viewing of the image comprises causing the apparatus to edit original image data of the image to prevent unauthorized viewing of the original image data.
US14/726,8542013-05-032015-06-01Image analysis and managementActive2033-05-25US9760724B2 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US14/726,854US9760724B2 (en)2013-05-032015-06-01Image analysis and management

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
US13/886,543US9064125B2 (en)2013-05-032013-05-03Image analysis and management
US14/726,854US9760724B2 (en)2013-05-032015-06-01Image analysis and management

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US13/886,543ContinuationUS9064125B2 (en)2013-05-032013-05-03Image analysis and management

Publications (2)

Publication NumberPublication Date
US20150261969A1true US20150261969A1 (en)2015-09-17
US9760724B2 US9760724B2 (en)2017-09-12

Family

ID=50884526

Family Applications (2)

Application NumberTitlePriority DateFiling Date
US13/886,543Active2033-06-28US9064125B2 (en)2013-05-032013-05-03Image analysis and management
US14/726,854Active2033-05-25US9760724B2 (en)2013-05-032015-06-01Image analysis and management

Family Applications Before (1)

Application NumberTitlePriority DateFiling Date
US13/886,543Active2033-06-28US9064125B2 (en)2013-05-032013-05-03Image analysis and management

Country Status (6)

CountryLink
US (2)US9064125B2 (en)
EP (1)EP2992669B1 (en)
JP (2)JP2016526202A (en)
KR (1)KR101798471B1 (en)
CN (1)CN105393524B (en)
WO (1)WO2014179542A1 (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9888143B1 (en)2016-11-152018-02-06International Business Machines CorporationTimed image deletion from a personal electronic device
US20180196410A1 (en)*2016-03-142018-07-12Omron CorporationRelay device, control method for relay device, and non-transitory computer-readable recording medium
US11050767B2 (en)2018-12-172021-06-29Forcepoint, LLCSystem for identifying and handling electronic communications from a potentially untrustworthy sending entity
US11245723B2 (en)2018-11-022022-02-08Forcepoint, LLCDetection of potentially deceptive URI (uniform resource identifier) of a homograph attack
US11297099B2 (en)2018-11-292022-04-05Forcepoint, LLCRedisplay computing with integrated data filtering
US11295026B2 (en)*2018-11-202022-04-05Forcepoint, LLCScan, detect, and alert when a user takes a photo of a computer monitor with a mobile phone
US11350254B1 (en)*2015-05-052022-05-31F5, Inc.Methods for enforcing compliance policies and devices thereof
US11349868B2 (en)2018-01-182022-05-31Forcepoint, LLCDetection of spoofed internally-addressed email using trusted third party's SPF records
US11379426B2 (en)2019-02-052022-07-05Forcepoint, LLCMedia transfer protocol file copy detection
US11562093B2 (en)2019-03-062023-01-24Forcepoint LlcSystem for generating an electronic security policy for a file format type

Families Citing this family (19)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
KR101541591B1 (en)*2013-05-162015-08-03삼성에스디에스 주식회사System and method for single-sign-on in virtual desktop infrastructure environment
US10410003B2 (en)*2013-06-072019-09-10Apple Inc.Multiple containers assigned to an application
US10089458B2 (en)*2013-09-262018-10-02Citrix Systems, Inc.Separate, disposable execution environment for accessing unverified content
EP3281379B1 (en)*2015-04-102019-01-09PCMS Holdings, Inc.System and method for delegation of cloud computing processes
US9703973B2 (en)*2015-04-282017-07-11International Business Machines CorporationCustomer load of field programmable gate arrays
US20170063883A1 (en)*2015-08-262017-03-02Fortinet, Inc.Metadata information based file processing
US10394346B2 (en)2016-05-202019-08-27Citrix Systems, Inc.Using a hardware mouse to operate a local application running on a mobile device
US10466811B2 (en)2016-05-202019-11-05Citrix Systems, Inc.Controlling a local application running on a user device that displays a touchscreen image on a touchscreen via mouse input from external electronic equipment
US10936895B2 (en)*2017-07-262021-03-02Vmware, Inc.Managing camera actions
US11023597B2 (en)2018-02-222021-06-01Citrix Systems, Inc.Providing security to mobile devices via image evaluation operations that electronically analyze image data received from cameras of the mobile devices
US10754998B2 (en)2018-10-172020-08-25Bank Of America CorporationData loss prevention using machine learning
US11487559B2 (en)2019-10-072022-11-01Citrix Systems, Inc.Dynamically switching between pointer modes
US11586685B2 (en)2019-10-312023-02-21Citrix Systems, Inc.Systems and methods for generating data structures from browser data to determine and initiate actions based thereon
US20210182440A1 (en)*2019-12-172021-06-17Citrix Systems, Inc.System for preventing access to sensitive information and related techniques
US11403369B2 (en)*2020-01-212022-08-02Disney Enterprises, Inc.Secure content processing pipeline
US11537824B2 (en)*2020-02-192022-12-27Lenovo (Singapore) Pte. Ltd.Categorization of photographs
US11457483B2 (en)2020-03-302022-09-27Citrix Systems, Inc.Managing connections between a user device and peripheral devices
US12056232B2 (en)*2021-08-272024-08-06EMC IP Holding Company LLCFunction-based service framework with trusted execution platform
US20240354439A1 (en)*2023-04-242024-10-24Nathaniel J. BritellSystems and methods for securing sensitive data

Citations (70)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5734752A (en)*1996-09-241998-03-31Xerox CorporationDigital watermarking using stochastic screen patterns
US20020087885A1 (en)*2001-01-032002-07-04Vidius Inc.Method and application for a reactive defense against illegal distribution of multimedia content in file sharing networks
US20020122565A1 (en)*2000-12-072002-09-05Keating Stephen MarkImage processing apparatus
US20020141611A1 (en)*2000-12-072002-10-03Keating Stephen MarkImage processing apparatus
US20020184535A1 (en)*2001-05-302002-12-05Farah MoavenMethod and system for accessing a resource in a computing system
US20030076979A1 (en)*2001-07-102003-04-24Kowa Co., Ltd.Method of embedding digital watermark, method of extracting embedded digital watermark and apparatuses for the same
US20030166399A1 (en)*2002-03-012003-09-04Timo TokkonenPrioritization of files in a memory
US20030210803A1 (en)*2002-03-292003-11-13Canon Kabushiki KaishaImage processing apparatus and method
US20040003253A1 (en)*2002-04-112004-01-01Sony Corporation.Additional-information detection processing apparatus and method, content playback processing apparatus and method, and computer program
US6721437B1 (en)*1999-02-052004-04-13Sony CorporationData processing apparatus, coding apparatus, data processing method and coding method
US20040091132A1 (en)*2002-11-122004-05-13Canon Kabushiki KaishaMethod, apparatus, and computer program for embedding digital watermark, and method, apparatus, and computer program product for extracting digital watermark
US20040243806A1 (en)*2001-04-302004-12-02Mckinley Tyler J.Digital watermarking security systems
US20050058319A1 (en)*1996-04-252005-03-17Rhoads Geoffrey B.Portable devices and methods employing digital watermarking
US20050141010A1 (en)*2003-11-212005-06-30Yoichi KanaiScanner device, scanner system and image protection method
US20060004697A1 (en)*2004-06-092006-01-05Lipsky Scott EMethod and system for restricting the display of images
US20060069668A1 (en)*2004-09-302006-03-30Citrix Systems, Inc.Method and apparatus for assigning access control levels in providing access to networked content files
US20060200570A1 (en)*2005-03-022006-09-07Nokia CorporationDiscovering and mounting network file systems via ad hoc, peer-to-peer networks
US20070129012A1 (en)*2003-04-012007-06-07Iceberg Systems LimitedPortable digital devices
US7281272B1 (en)*1998-06-142007-10-09Finjan Software Ltd.Method and system for copyright protection of digital images
US20070266252A1 (en)*2000-01-132007-11-15Davis Bruce LAuthenticating Metadata and Embedding Metadata in Watermarks of Media Signals
US20070297013A1 (en)*2006-06-232007-12-27Konica Minolta Business Technologies, Inc.Image reading apparatus, image forming apparatus and image reading method
US20080032739A1 (en)*2005-12-212008-02-07Faraz HoodbhoyManagement of digital media using portable wireless devices in a client-server network
US7343320B1 (en)*1999-08-022008-03-11Treyz G VictorOnline digital image-based product ordering system
US20080196059A1 (en)*1999-12-282008-08-14Evans Douglas BSubstituting or Replacing Components in Media Objects Based on Steganographic Encoding
US20080212824A1 (en)*1996-10-282008-09-04International Bussiness Machines CorporationProtecting images with an image watermark
US20080243842A1 (en)*2007-03-282008-10-02Xerox CorporationOptimizing the performance of duplicate identification by content
US20080276089A1 (en)*2000-11-082008-11-06Jun TianContent Authentication and Recovery Using Digital Watermarks
US20090075630A1 (en)*2007-09-182009-03-19Mclean Ivan HMethod and Apparatus for Creating a Remotely Activated Secure Backup Service for Mobile Handsets
US20090165083A1 (en)*2007-12-242009-06-25Mclean Ivan HMethod and apparatus for managing policies for time-based licenses on mobile devices
US20090197584A1 (en)*2004-09-292009-08-06Rafe Communications LlcControlling Portable Digital Devices
US20090249011A1 (en)*2008-03-272009-10-01Fujitsu LimitedDelivery data backup apparatus, delivery data backup method and delivery data backup program
US20090249497A1 (en)*2008-04-012009-10-01William FitzgeraldMethod for monitoring the unauthorized use of a device
US20090253406A1 (en)*2008-04-022009-10-08William FitzgeraldSystem for mitigating the unauthorized use of a device
US20090253410A1 (en)*2008-04-022009-10-08William FitzgeraldMethod for mitigating the unauthorized use of a device
US20090257076A1 (en)*2005-09-022009-10-15Peking University Founder Group Co. Ltd.Method of document protection
US7606840B2 (en)*2004-06-152009-10-20At&T Intellectual Property I, L.P.Version control in a distributed computing environment
US7634134B1 (en)*2004-03-152009-12-15Vincent SoAnti-piracy image display methods and systems
US20100070476A1 (en)*2008-09-162010-03-18O'keefe Matthew TRemote backup and restore system and method
US7769197B2 (en)*2004-02-172010-08-03Mitsubishi Electric CorporationElectronic watermark embedding method, electronic watermark detecting method, electronic watermark detecting apparatus and program
US20100235336A1 (en)*2009-03-122010-09-16Samsung Electronics Co., Ltd.Method and apparatus for managing image files
US20100272362A1 (en)*2009-04-242010-10-28Kazuyuki OhnishiImage forming apparatus for extracting hand-written image
US7827440B1 (en)*2007-11-012010-11-02Apple Inc.Re-synchronizing corrupted data
US20110047341A1 (en)*2009-08-212011-02-24Samsung Electronics Co., Ltd.Remote data backup method and remote data backup system using the same
US20110299723A1 (en)*2010-06-072011-12-08Sharp Kabushiki KaishaImage processing apparatus, image forming apparatus, image processing method, and recording medium
US20120030546A1 (en)*2003-06-232012-02-02Alattar Adnan MWatermarking electronic text documents
US20120140978A1 (en)*2010-12-022012-06-07Samsung Electronics Co., Ltd.Image processing apparatus and control method thereof
US8234496B1 (en)*2009-03-062012-07-31Trend Micro, Inc.Image leak prevention using digital watermark
US20120218284A1 (en)*2011-02-252012-08-30Canon Kabushiki KaishaDynamic thresholds for document tamper detection
US20120230577A1 (en)*2011-03-082012-09-13Bank Of America CorporationRecognizing financial document images
US8280098B2 (en)*2005-05-192012-10-02Uti Limited PartnershipDigital watermarking CMOS sensor
US8379245B2 (en)*2007-01-302013-02-19Oki Data CorporationSystem for managing flexible copying with information leakage prevented and/or detected
US20130130653A1 (en)*2011-11-222013-05-23Vmware, Inc.User interface for controlling use of a business environment on a mobile device
US8472084B2 (en)*2007-02-062013-06-25Samsung Electronics Co., Ltd.Image processing apparatus optimizing information and control method thereof
US20130223673A1 (en)*2011-08-302013-08-29Digimarc CorporationMethods and arrangements for identifying objects
US20130305146A1 (en)*2012-05-112013-11-14Kabushiki Kaisha ToshibaSystem and handwritten document management method
US20130300675A1 (en)*2012-05-112013-11-14Kabushiki Kaisha ToshibaElectronic device and handwritten document processing method
US20140052555A1 (en)*2011-08-302014-02-20Digimarc CorporationMethods and arrangements for identifying objects
US20140072225A1 (en)*2012-09-072014-03-13Kabushiki Kaisha ToshibaInformation processing apparatus and handwritten document search method
US8677132B1 (en)*2012-01-062014-03-18Narus, Inc.Document security
US8699075B2 (en)*2009-04-022014-04-15Xerox CorporationPrinter image log system for document gathering and retention
US20140119659A1 (en)*2012-10-262014-05-01Kabushiki Kaisha ToshibaElectronic apparatus and handwritten document processing method
US20140212051A1 (en)*2012-03-122014-07-31Ravikiran ChukkaMethod and apparatus for controlling content capture of prohibited content
US20140219563A1 (en)*2013-02-012014-08-07Xerox CorporationLabel-embedding for text recognition
US20140229526A1 (en)*2013-02-132014-08-14Appsense LimitedSystems, methods and media for securely executing remote commands using cross-platform library
US8850597B1 (en)*2013-03-142014-09-30Ca, Inc.Automated message transmission prevention based on environment
US8887300B1 (en)*2013-03-142014-11-11Ca, Inc.Automated message transmission prevention based on a physical reaction
US9047253B1 (en)*2013-03-142015-06-02Ca, Inc.Detecting false statement using multiple modalities
US9055071B1 (en)*2013-03-142015-06-09Ca, Inc.Automated false statement alerts
US9208326B1 (en)*2013-03-142015-12-08Ca, Inc.Managing and predicting privacy preferences based on automated detection of physical reaction
US9256748B1 (en)*2013-03-142016-02-09Ca, Inc.Visual based malicious activity detection

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
JP4145171B2 (en)*2003-03-122008-09-03シャープ株式会社 Image processing device unauthorized use monitoring device
JP3685790B2 (en)*2003-05-302005-08-24シャープ株式会社 Image forming system and image forming apparatus
JP2005092539A (en)2003-09-172005-04-07Ricoh Co LtdContext information processor, context information processing server, context information processing method, program making computer execute this method, and computer-readable recording medium
CN101452515A (en)*2007-12-072009-06-10元镁科技股份有限公司File processing device, system and method
KR100985857B1 (en)2007-12-242010-10-08한국전자통신연구원 Apparatus and method for detecting and blocking the leakage of sensitive information of a mobile terminal
US8695058B2 (en)2009-05-202014-04-08Mobile Iron, Inc.Selective management of mobile device data in an enterprise environment
JP2010283457A (en)*2009-06-022010-12-16Konica Minolta Business Technologies IncImage data processing apparatus, and image data processing program
JP5629908B2 (en)*2010-04-132014-11-26株式会社日立製作所 Secure document detection method, secure document detection program, and optical character reader
US8365243B1 (en)2010-07-142013-01-29Trend Micro, Inc.Image leak prevention using geotagging
EP2448303B1 (en)*2010-11-012014-02-26BlackBerry LimitedMethod and system for securing data of a mobile communications device
CN102509057B (en)*2011-10-182015-05-13国网电力科学研究院Mark-based method for safely filtering unstructured data

Patent Citations (86)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20050058319A1 (en)*1996-04-252005-03-17Rhoads Geoffrey B.Portable devices and methods employing digital watermarking
US5734752A (en)*1996-09-241998-03-31Xerox CorporationDigital watermarking using stochastic screen patterns
US20080212824A1 (en)*1996-10-282008-09-04International Bussiness Machines CorporationProtecting images with an image watermark
US7281272B1 (en)*1998-06-142007-10-09Finjan Software Ltd.Method and system for copyright protection of digital images
US6721437B1 (en)*1999-02-052004-04-13Sony CorporationData processing apparatus, coding apparatus, data processing method and coding method
US7343320B1 (en)*1999-08-022008-03-11Treyz G VictorOnline digital image-based product ordering system
US20080196059A1 (en)*1999-12-282008-08-14Evans Douglas BSubstituting or Replacing Components in Media Objects Based on Steganographic Encoding
US20070266252A1 (en)*2000-01-132007-11-15Davis Bruce LAuthenticating Metadata and Embedding Metadata in Watermarks of Media Signals
US20080276089A1 (en)*2000-11-082008-11-06Jun TianContent Authentication and Recovery Using Digital Watermarks
US20020141611A1 (en)*2000-12-072002-10-03Keating Stephen MarkImage processing apparatus
US20020122565A1 (en)*2000-12-072002-09-05Keating Stephen MarkImage processing apparatus
US20020087885A1 (en)*2001-01-032002-07-04Vidius Inc.Method and application for a reactive defense against illegal distribution of multimedia content in file sharing networks
US20040243806A1 (en)*2001-04-302004-12-02Mckinley Tyler J.Digital watermarking security systems
US20020184535A1 (en)*2001-05-302002-12-05Farah MoavenMethod and system for accessing a resource in a computing system
US20030076979A1 (en)*2001-07-102003-04-24Kowa Co., Ltd.Method of embedding digital watermark, method of extracting embedded digital watermark and apparatuses for the same
US20030166399A1 (en)*2002-03-012003-09-04Timo TokkonenPrioritization of files in a memory
US7158176B2 (en)*2002-03-012007-01-02Nokia CorporationPrioritization of files in a memory
US20030210803A1 (en)*2002-03-292003-11-13Canon Kabushiki KaishaImage processing apparatus and method
US20040003253A1 (en)*2002-04-112004-01-01Sony Corporation.Additional-information detection processing apparatus and method, content playback processing apparatus and method, and computer program
US20040091132A1 (en)*2002-11-122004-05-13Canon Kabushiki KaishaMethod, apparatus, and computer program for embedding digital watermark, and method, apparatus, and computer program product for extracting digital watermark
US20070129012A1 (en)*2003-04-012007-06-07Iceberg Systems LimitedPortable digital devices
US20120030546A1 (en)*2003-06-232012-02-02Alattar Adnan MWatermarking electronic text documents
US8320611B2 (en)*2003-06-232012-11-27Digimarc CorporationWatermarking electronic text documents
US20050141010A1 (en)*2003-11-212005-06-30Yoichi KanaiScanner device, scanner system and image protection method
US7769197B2 (en)*2004-02-172010-08-03Mitsubishi Electric CorporationElectronic watermark embedding method, electronic watermark detecting method, electronic watermark detecting apparatus and program
US7634134B1 (en)*2004-03-152009-12-15Vincent SoAnti-piracy image display methods and systems
US20060004697A1 (en)*2004-06-092006-01-05Lipsky Scott EMethod and system for restricting the display of images
US7606840B2 (en)*2004-06-152009-10-20At&T Intellectual Property I, L.P.Version control in a distributed computing environment
US20090197584A1 (en)*2004-09-292009-08-06Rafe Communications LlcControlling Portable Digital Devices
US7711835B2 (en)*2004-09-302010-05-04Citrix Systems, Inc.Method and apparatus for reducing disclosure of proprietary data in a networked environment
US8352606B2 (en)*2004-09-302013-01-08Citrix Systems, Inc.Method and system for assigning access control levels in providing access to networked content files
US20060069668A1 (en)*2004-09-302006-03-30Citrix Systems, Inc.Method and apparatus for assigning access control levels in providing access to networked content files
US20060069683A1 (en)*2004-09-302006-03-30Braddy Ricky GMethod and apparatus for assigning access control levels in providing access to networked content files
US8065423B2 (en)*2004-09-302011-11-22Citrix Systems, Inc.Method and system for assigning access control levels in providing access to networked content files
US7870294B2 (en)*2004-09-302011-01-11Citrix Systems, Inc.Method and apparatus for providing policy-based document control
US7865603B2 (en)*2004-09-302011-01-04Citrix Systems, Inc.Method and apparatus for assigning access control levels in providing access to networked content files
US20060074837A1 (en)*2004-09-302006-04-06Citrix Systems, Inc.A method and apparatus for reducing disclosure of proprietary data in a networked environment
US20060075463A1 (en)*2004-09-302006-04-06Citrix Systems, Inc.Method and apparatus for providing policy-based document control
US20060200570A1 (en)*2005-03-022006-09-07Nokia CorporationDiscovering and mounting network file systems via ad hoc, peer-to-peer networks
US8280098B2 (en)*2005-05-192012-10-02Uti Limited PartnershipDigital watermarking CMOS sensor
US8120795B2 (en)*2005-09-022012-02-21Peking University Founder Group Co., Ltd.;Method of document protection
US20090257076A1 (en)*2005-09-022009-10-15Peking University Founder Group Co. Ltd.Method of document protection
US20080032739A1 (en)*2005-12-212008-02-07Faraz HoodbhoyManagement of digital media using portable wireless devices in a client-server network
US20070297013A1 (en)*2006-06-232007-12-27Konica Minolta Business Technologies, Inc.Image reading apparatus, image forming apparatus and image reading method
US8379245B2 (en)*2007-01-302013-02-19Oki Data CorporationSystem for managing flexible copying with information leakage prevented and/or detected
US8472084B2 (en)*2007-02-062013-06-25Samsung Electronics Co., Ltd.Image processing apparatus optimizing information and control method thereof
US7617195B2 (en)*2007-03-282009-11-10Xerox CorporationOptimizing the performance of duplicate identification by content
US20080243842A1 (en)*2007-03-282008-10-02Xerox CorporationOptimizing the performance of duplicate identification by content
US8554176B2 (en)*2007-09-182013-10-08Qualcomm IncorporatedMethod and apparatus for creating a remotely activated secure backup service for mobile handsets
US20090075630A1 (en)*2007-09-182009-03-19Mclean Ivan HMethod and Apparatus for Creating a Remotely Activated Secure Backup Service for Mobile Handsets
US7827440B1 (en)*2007-11-012010-11-02Apple Inc.Re-synchronizing corrupted data
US20090165083A1 (en)*2007-12-242009-06-25Mclean Ivan HMethod and apparatus for managing policies for time-based licenses on mobile devices
US20090249011A1 (en)*2008-03-272009-10-01Fujitsu LimitedDelivery data backup apparatus, delivery data backup method and delivery data backup program
US20090249497A1 (en)*2008-04-012009-10-01William FitzgeraldMethod for monitoring the unauthorized use of a device
US20090253406A1 (en)*2008-04-022009-10-08William FitzgeraldSystem for mitigating the unauthorized use of a device
US20090253410A1 (en)*2008-04-022009-10-08William FitzgeraldMethod for mitigating the unauthorized use of a device
US8311985B2 (en)*2008-09-162012-11-13Quest Software, Inc.Remote backup and restore system and method
US20100070476A1 (en)*2008-09-162010-03-18O'keefe Matthew TRemote backup and restore system and method
US8234496B1 (en)*2009-03-062012-07-31Trend Micro, Inc.Image leak prevention using digital watermark
US20100235336A1 (en)*2009-03-122010-09-16Samsung Electronics Co., Ltd.Method and apparatus for managing image files
US8699075B2 (en)*2009-04-022014-04-15Xerox CorporationPrinter image log system for document gathering and retention
US20100272362A1 (en)*2009-04-242010-10-28Kazuyuki OhnishiImage forming apparatus for extracting hand-written image
US20110047341A1 (en)*2009-08-212011-02-24Samsung Electronics Co., Ltd.Remote data backup method and remote data backup system using the same
US20110299723A1 (en)*2010-06-072011-12-08Sharp Kabushiki KaishaImage processing apparatus, image forming apparatus, image processing method, and recording medium
US20120140978A1 (en)*2010-12-022012-06-07Samsung Electronics Co., Ltd.Image processing apparatus and control method thereof
US20120218284A1 (en)*2011-02-252012-08-30Canon Kabushiki KaishaDynamic thresholds for document tamper detection
US20120230577A1 (en)*2011-03-082012-09-13Bank Of America CorporationRecognizing financial document images
US20130223673A1 (en)*2011-08-302013-08-29Digimarc CorporationMethods and arrangements for identifying objects
US20140052555A1 (en)*2011-08-302014-02-20Digimarc CorporationMethods and arrangements for identifying objects
US20130130652A1 (en)*2011-11-222013-05-23Vmware, Inc.Controlling use of a business environment on a mobile device
US20130130653A1 (en)*2011-11-222013-05-23Vmware, Inc.User interface for controlling use of a business environment on a mobile device
US20130130651A1 (en)*2011-11-222013-05-23Vmware, Inc.Provisioning work environments on personal mobile devices
US8677132B1 (en)*2012-01-062014-03-18Narus, Inc.Document security
US20140212051A1 (en)*2012-03-122014-07-31Ravikiran ChukkaMethod and apparatus for controlling content capture of prohibited content
US20130305146A1 (en)*2012-05-112013-11-14Kabushiki Kaisha ToshibaSystem and handwritten document management method
US20130300675A1 (en)*2012-05-112013-11-14Kabushiki Kaisha ToshibaElectronic device and handwritten document processing method
US20140072225A1 (en)*2012-09-072014-03-13Kabushiki Kaisha ToshibaInformation processing apparatus and handwritten document search method
US20140119659A1 (en)*2012-10-262014-05-01Kabushiki Kaisha ToshibaElectronic apparatus and handwritten document processing method
US20140219563A1 (en)*2013-02-012014-08-07Xerox CorporationLabel-embedding for text recognition
US20140229526A1 (en)*2013-02-132014-08-14Appsense LimitedSystems, methods and media for securely executing remote commands using cross-platform library
US8850597B1 (en)*2013-03-142014-09-30Ca, Inc.Automated message transmission prevention based on environment
US8887300B1 (en)*2013-03-142014-11-11Ca, Inc.Automated message transmission prevention based on a physical reaction
US9047253B1 (en)*2013-03-142015-06-02Ca, Inc.Detecting false statement using multiple modalities
US9055071B1 (en)*2013-03-142015-06-09Ca, Inc.Automated false statement alerts
US9208326B1 (en)*2013-03-142015-12-08Ca, Inc.Managing and predicting privacy preferences based on automated detection of physical reaction
US9256748B1 (en)*2013-03-142016-02-09Ca, Inc.Visual based malicious activity detection

Cited By (11)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US11350254B1 (en)*2015-05-052022-05-31F5, Inc.Methods for enforcing compliance policies and devices thereof
US20180196410A1 (en)*2016-03-142018-07-12Omron CorporationRelay device, control method for relay device, and non-transitory computer-readable recording medium
US11067969B2 (en)*2016-03-142021-07-20Omron CorporationRelay device for relaying data between devices, control method therefor, and non-transitory computer-readable recording medium therefor
US9888143B1 (en)2016-11-152018-02-06International Business Machines CorporationTimed image deletion from a personal electronic device
US11349868B2 (en)2018-01-182022-05-31Forcepoint, LLCDetection of spoofed internally-addressed email using trusted third party's SPF records
US11245723B2 (en)2018-11-022022-02-08Forcepoint, LLCDetection of potentially deceptive URI (uniform resource identifier) of a homograph attack
US11295026B2 (en)*2018-11-202022-04-05Forcepoint, LLCScan, detect, and alert when a user takes a photo of a computer monitor with a mobile phone
US11297099B2 (en)2018-11-292022-04-05Forcepoint, LLCRedisplay computing with integrated data filtering
US11050767B2 (en)2018-12-172021-06-29Forcepoint, LLCSystem for identifying and handling electronic communications from a potentially untrustworthy sending entity
US11379426B2 (en)2019-02-052022-07-05Forcepoint, LLCMedia transfer protocol file copy detection
US11562093B2 (en)2019-03-062023-01-24Forcepoint LlcSystem for generating an electronic security policy for a file format type

Also Published As

Publication numberPublication date
JP2016526202A (en)2016-09-01
EP2992669B1 (en)2019-08-28
US9064125B2 (en)2015-06-23
JP2019091480A (en)2019-06-13
KR20160005114A (en)2016-01-13
US20140331333A1 (en)2014-11-06
WO2014179542A1 (en)2014-11-06
CN105393524B (en)2019-01-08
JP6718530B2 (en)2020-07-08
US9760724B2 (en)2017-09-12
CN105393524A (en)2016-03-09
KR101798471B1 (en)2017-11-16
EP2992669A1 (en)2016-03-09

Similar Documents

PublicationPublication DateTitle
US9760724B2 (en)Image analysis and management
US11734635B2 (en)Deploying and implementing enterprise policies that control augmented reality computing functions
US11381610B2 (en)Systems and methods for establishing a channel between multiple devices
US9280377B2 (en)Application with multiple operation modes
US9218494B2 (en)Secure client drive mapping and file storage system for mobile device management type security
US20220070206A1 (en)Secure device selection based on sensitive content detection
US11423121B2 (en)Real time digital content concealment
US10846463B2 (en)Document object model (DOM) element location platform
US11681506B2 (en)Transforming validated user interface layouts using inter-platform design mapping data
US11557016B2 (en)Tracking image senders on client devices
EP3651051A1 (en)Systems and methods for a saas lens to view obfuscated content

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:CITRIX SYSTEMS, INC., FLORIDA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:FROST, SIMON;REEL/FRAME:042299/0928

Effective date:20130501

STCFInformation on status: patent grant

Free format text:PATENTED CASE

MAFPMaintenance fee payment

Free format text:PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment:4

ASAssignment

Owner name:WILMINGTON TRUST, NATIONAL ASSOCIATION, DELAWARE

Free format text:SECURITY INTEREST;ASSIGNOR:CITRIX SYSTEMS, INC.;REEL/FRAME:062079/0001

Effective date:20220930

ASAssignment

Owner name:GOLDMAN SACHS BANK USA, AS COLLATERAL AGENT, NEW YORK

Free format text:SECOND LIEN PATENT SECURITY AGREEMENT;ASSIGNORS:TIBCO SOFTWARE INC.;CITRIX SYSTEMS, INC.;REEL/FRAME:062113/0001

Effective date:20220930

Owner name:WILMINGTON TRUST, NATIONAL ASSOCIATION, AS NOTES COLLATERAL AGENT, DELAWARE

Free format text:PATENT SECURITY AGREEMENT;ASSIGNORS:TIBCO SOFTWARE INC.;CITRIX SYSTEMS, INC.;REEL/FRAME:062113/0470

Effective date:20220930

Owner name:BANK OF AMERICA, N.A., AS COLLATERAL AGENT, NORTH CAROLINA

Free format text:PATENT SECURITY AGREEMENT;ASSIGNORS:TIBCO SOFTWARE INC.;CITRIX SYSTEMS, INC.;REEL/FRAME:062112/0262

Effective date:20220930

ASAssignment

Owner name:CLOUD SOFTWARE GROUP, INC. (F/K/A TIBCO SOFTWARE INC.), FLORIDA

Free format text:RELEASE AND REASSIGNMENT OF SECURITY INTEREST IN PATENT (REEL/FRAME 062113/0001);ASSIGNOR:GOLDMAN SACHS BANK USA, AS COLLATERAL AGENT;REEL/FRAME:063339/0525

Effective date:20230410

Owner name:CITRIX SYSTEMS, INC., FLORIDA

Free format text:RELEASE AND REASSIGNMENT OF SECURITY INTEREST IN PATENT (REEL/FRAME 062113/0001);ASSIGNOR:GOLDMAN SACHS BANK USA, AS COLLATERAL AGENT;REEL/FRAME:063339/0525

Effective date:20230410

Owner name:WILMINGTON TRUST, NATIONAL ASSOCIATION, AS NOTES COLLATERAL AGENT, DELAWARE

Free format text:PATENT SECURITY AGREEMENT;ASSIGNORS:CLOUD SOFTWARE GROUP, INC. (F/K/A TIBCO SOFTWARE INC.);CITRIX SYSTEMS, INC.;REEL/FRAME:063340/0164

Effective date:20230410

ASAssignment

Owner name:WILMINGTON TRUST, NATIONAL ASSOCIATION, AS NOTES COLLATERAL AGENT, DELAWARE

Free format text:SECURITY INTEREST;ASSIGNORS:CLOUD SOFTWARE GROUP, INC. (F/K/A TIBCO SOFTWARE INC.);CITRIX SYSTEMS, INC.;REEL/FRAME:067662/0568

Effective date:20240522

MAFPMaintenance fee payment

Free format text:PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment:8


[8]ページ先頭

©2009-2025 Movatter.jp